The videos in this collection are from ShmooCon 2017, which occurred on 13-15 January 2017, at the Washington Hilton Hotel.


Friday - 13 January 2017 Talks (One Track Mind):

Opening Remarks, Rumblings, Ruminations, and Rants

Conor Patrick - U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime

Space Rogue - 35 Years of Cyberwar: The Squirrels are Winning

Kenny McElroy - Implantable Logic Analyzers and Unlocking Doors

Jeff Dodge - Cyborg Self-Hacking: An Examination of Cochlear Implants

Chris DiLorenzo - Introducing Jak: Safely Share Sensitive Files via Git

Tommy Chin and Peter Muller - Can a Drunk Person Authenticate Using Brainwaves? 

Keynote - Dr. Gary McGraw - Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security


Various - Firetalks (see subset below):

Jason Blanchard - How to Spoil all Movies and Give an Unforgettable Presentation

Travis Goodspeed - Quick and Dirty Emulation of ARM Firmware

Peter Clemenko - NAVRIE Athena: A graph database solution to unify InfoSec data and workflow

Charlie Vedaa - 22 Short Films About Security

John Willis - Slash AppSec Costs, Free Threat Modeling & Compliance Data Output

Brendan O’Connor - You Can Do the Thing!


Saturday - 14 January 2017 Talks (Build It!, Belay It! and Bring it On!):

Marc Newlin and Matt Knight - So You Want to Hack Radios

Falcon Darkstar Momot and Sergey Bratus - LangSec for Penetration Testing: How and Why

Brian David Johnson and Natalie Vanatta - A Widening Attack Plain: Threatcasting Tomorrow’s Threats

Dominic Spill and Michael Ossmann - Exploring The Infrared World

Allan Friedman, Nick Leiserson, Eric Mill, and Jessica Wilkerson - Ask the Feds

David Wu and Sergey Bratus - A Context-Aware Kernel IPC Firewall for Android

Brian Redbeard and Brad Ison - Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.

Kurt Opsahl and Andrew Crocker - Ask the EFF: Protecting Tomorrow

Paul Clark - WaveConverter: An Open Source Software Tool for RF Reverse Engineering

Whitney Merrill and Aaron Alva - Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it

Allison Miller, Melissa Clarke, and Margaret Schedel - h·cek: Computing a Hacker Experience

Nicolas Kseib and Shimon Modi - I Have a Graph Database. Now What?

Rebekah Houser - Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles

Lauren Pearce - Flailing is Learning: My First Year as a Malware Analyst

The Shmoo Group - 0wn the Con

Alexander Chailytko and Stanislav Skuratovich - Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment

Nikita Borisov and Sze Chuen Tan - The State of Secure Messaging

Andrew White and Jesse Kriss - User Focused Security at Netflix: Stethoscope

Gal Shpantzer and G. Mark Hardy - Anti-Ransomware: Turning the Tables

Matt Blaze - The Metadata is the Message (and Sometimes the Message is the Metadata


Sunday - 15 January 2017 Talks (Build It!, Belay It! and Bring it On!):

Patrick Biernat - ripr: Run Slices of Binary Code from Python

Brandon Creighton - Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio

Ryan Castellucci - A Nickel Tour of the Ad Fraud Ecosystem

Rich Seymour - Safety Bot Guaranteed

Brian Cardinale - Excuse me, Server, Do You Have the Time?

Mark Kuhr - The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims

Sebastian Verschoor - (In-)secure messaging with SCIMP and OMEMO

Toni Gidwani - Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election

Anil Karmel and Andrew Wild - Challenges and Opportunities: Application Containers and Micro Services

Tim Vidas, Chris Eagle, Jason Wright, Brian Caswell, Mike Thompson, and Holt Sorenson - Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team

Closing Remarks